• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Group Key Agreement From Signcryption

Vol. 6, No.12, December 31, 2012
10.3837/tiis.2012.12.017, Download Paper (Free):


There is an intuitive connection between signcryption and key agreement. Such a connector may lead to a novel way to construct authenticated and efficient group key agreement protocols. In this paper, we present a primary approach for constructing an authenticated group key agreement protocol from signcryption. This approach introduces desired properties to group key agreement. What this means is that the signcryption gives assurance to a sender that the key is available only to the recipient, and assurance to the recipient that the key indeed comes from the sender. Following the generic construction, we instantiate a distributed two-round group key agreement protocol based on signcryption scheme given by Dent [8]. We also show that this concrete protocol is secure in the outsider unforgeability notion and the outsider confidentiality notion assuming hardness of the Gap Diffie-Hellman problem


Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.

Cite this article

[IEEE Style]
Xixiang Lv and Hui Li, "Group Key Agreement From Signcryption," KSII Transactions on Internet and Information Systems, vol. 6, no. 12, pp. 3338-3351, 2012. DOI: 10.3837/tiis.2012.12.017

[ACM Style]
Lv, X. and Li, H. 2012. Group Key Agreement From Signcryption. KSII Transactions on Internet and Information Systems, 6, 12, (2012), 3338-3351. DOI: 10.3837/tiis.2012.12.017